Sökt på: Sökresultat
totalt 9 träffar
Adaptive Security Management Architecture
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the …
Adaptive Security Management Architecture
For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But …
Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and …
Ethical Hack
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to …
A Technical Guide to IPSec Virtual Private Networks
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to …
Technical Guide to IPSec Virtual Private Networks
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to …
CISO's Guide to Penetration Testing
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should …
CISO's Guide to Penetration Testing
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should …
The Ethical Hack
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed …